Items tagged with security

The beginning of the year saw a flurry of stories about security breaches as the cybercriminal gang known as LAPSUS$ stole data from an alarming number of big name companies in a short period of time. However, while LAPSUS$ is no longer in operation, after the London police arrested all seven members of the group... Read more...
On the 10th of May this year the patch Tuesday updates for Windows started rolling out. Unfortunately, as almost always seems to be the case, there are more and more problems piling up. Of course, the first issue people started reporting was related to servers who use Kerberos and Domain Controllers on server... Read more...
Many are aware by now, second Tuesday of every month is Patch Tuesday for Microsoft Windows. This is when Microsoft rolls out major and critical updates to its ubiquitous operating system, Windows. Much like many Patch Tuesdays before, there are problems with the latest one. Specifically, the patch has problems... Read more...
Unlike driver updates, BIOS releases typically arrive far less often—usually when vendors add support for new CPUs, but also occasionally to improve stability and performance, or to address security vulnerabilities. Regarding the latter, HP is pushing out firmware updates for over 200 laptops and desktops to patch a... Read more...
When you fill out an online form and hit the submit button, you're willingly transmitting your personal data to the website and any third parties you may have agreed to in the fine print. That's fair game. However, an alarming security report suggests your data is sometimes transmitted even if you change your mind and... Read more...
Another day another malware threat. Yes, yet another new way of delivering malware has shown up recently. That new way does not directly involve files but Windows Event Logs. According to security researchers at Kaspersky, a customer showed this new behavior. The method injects shellcode payloads into the event... Read more...
When you are investigating a crime, one of the most important things to establish is "motive." If you know a crime has been committed, having an understanding of why it happened is a critical step to figuring out who did it. In the strictest sense, installing software on someone else's computer isn't a crime. It's... Read more...
Admit it, you use the same password for multiple sites. Even if you don't, a lot of people do because it's just too darn difficult to juggle separate login credentials for a multitude of services and websites that you use or visit on a regular basis. Maybe you employ a password manager to keep track of everything, or... Read more...
Last week, Google introduced its new data safety section for the Play Store, which states that Android application developers have until July 20th to fully disclose their data collection, sharing, and safety practices. A new analysis of popular Android apps shows why this kind of data collection transparency is... Read more...
Windows Updates are a great idea, most of the time. Other times they're an annoyance, like when they download and install in the background while you're trying to play a system-intensive game. Or, they are just outright broken for some people. The latter of those seems to be the case for some Windows 11 users... Read more...
We’ve recently covered a number of sophisticated phishing scam techniques, including fake animated windows designed to steal passwords and automated call bots that trick victims into giving away multi-factor authentication codes. While ransomware attacks are currently on track to surpass phishing attacks as the number... Read more...
AV Comparatives has posted the results of its latest performance impact test of over a dozen popular antivirus programs, and unfortunately for Microsoft, its Defender program that's built into Windows only narrowly avoided coming in dead last. On the bright side, though, Defender moved up from taking the last spot in... Read more...
Another day another vulnerability. Several, actually—the Stable Channel for the desktop edition of Chrome had an update on April 26, 2022 that includes no less than 30 security fixes, half a dozen of which are rated as "High" severity flaws. The release notes for Google's Chrome v101.0.4951.41 for Windows, Mac, and... Read more...
Have you ever Googled yourself and stumbled upon some less than savory information or simply something you wouldn't want to be easily found? As Google states, it's important to control how people can find your sensitive, personally identifiable information (PII), so now you can. Using a new Google tool, users can... Read more...
Microsoft will be retiring Internet Explorer once and for all on June 15. However, Microsoft won’t be out of the web browser game with this retirement. The company has shifted its focus to maintaining and developing the Chromium-based Edge browser. Microsoft rolls out new Edge features fairly often, though some of... Read more...
Microsoft's Windows has plenty of reason to be proud of its status as the desktop operating system of choice for personal computers, but Linux drives a massive portion of the processing that lies beneath the surface of the internet at large. Ultimately, it's to everyone's benefit if security holes are closed, so we... Read more...
Back in May of 2021, Google announced that privacy labels would be coming to the Google Play Store. Now, almost a year later, the company has announced that it will soon be rolling these labels out to the Play Store with requirements for application developers. The Google Play Store already features an expandable... Read more...
When Coca-Cola started its “Share A Coke” campaign in the early 2010s, it was certainly not thinking of this. A ransomware group dubbed “Stormous” has reportedly stolen 161GB of data from Coca-Cola. The data is currently for sale on the dark web, although Coca-Cola has not confirmed the breach. The data includes... Read more...
We'll come clean up front: it's true that these security exploits require local access, and due to that fact, the urgent need to update might be a bit overstated. In this case, though, the excitement is less about the breadth of the vulnerabilities and instead the severity. If you're confused, Lenovo published a... Read more...
As we have alluded to in numerous recent posts, security and malware-related alerts are almost weekly if not more frequent. According to Google's Project Zero, a whopping 58 zero day exploits were found in 2021. That's basically about 1.12 new zero day exploits a week. Project Zero is an initiative from Google... Read more...
Back in January, we covered a phishing report by Check Point that placed DHL as the number one most-imitated brand in phishing attacks for the fourth quarter of 2021. DHL spoofs, representing 23% of global phishing attacks, passed Microsoft spoofs, which sat at 20%. However, Check Point just released its phishing... Read more...
There has been an ever-increasing number of vulnerabilities and malware rearing their ugly heads lately. One of the most common things these malware will attempt to do is gain elevated permissions to allow execution of its code without user interaction. Recently, a new vulnerability was found in the popular archival... Read more...
1 2 3 4 5 Next ... Last